收藏 分享(赏)

ASTM_E_2147_-_01_2013.pdf

上传人:益****师 文档编号:170125 上传时间:2023-03-04 格式:PDF 页数:6 大小:96.92KB
下载 相关 举报
ASTM_E_2147_-_01_2013.pdf_第1页
第1页 / 共6页
ASTM_E_2147_-_01_2013.pdf_第2页
第2页 / 共6页
ASTM_E_2147_-_01_2013.pdf_第3页
第3页 / 共6页
ASTM_E_2147_-_01_2013.pdf_第4页
第4页 / 共6页
ASTM_E_2147_-_01_2013.pdf_第5页
第5页 / 共6页
ASTM_E_2147_-_01_2013.pdf_第6页
第6页 / 共6页
亲,该文档总共6页,全部预览完了,如果喜欢就下载吧!
资源描述

1、Designation:E214701(Reapproved 2013)An American National StandardStandard Specification forAudit and Disclosure Logs for Use in Health InformationSystems1This standard is issued under the fixed designation E2147;the number immediately following the designation indicates the year oforiginal adoption

2、or,in the case of revision,the year of last revision.A number in parentheses indicates the year of last reapproval.Asuperscript epsilon()indicates an editorial change since the last revision or reapproval.1.Scope1.1 This specification is for the development and implemen-tation of security audit/disc

3、losure logs for health information.It specifies how to design an access audit log to record allaccess to patient identifiable information maintained in com-puter systems and includes principles for developing policies,procedures,and functions of health information logs to docu-ment all disclosure of

4、 health information to external users foruse in manual and computer systems.The process of informa-tion disclosure and auditing should conform,where relevant,with the Privacy Act of 1974(1).21.2 The first purpose of this specification is to define thenature,role,and function of system access audit l

5、ogs and theiruse in health information systems as a technical and proceduraltool to help provide security oversight.In concert with orga-nizational confidentiality and security policies and procedures,permanent audit logs can clearly identify all system applicationusers who access patient identifiab

6、le information,record thenature of the patient information accessed,and maintain apermanent record of actions taken by the user.By providing aprecise method for an organization to monitor and review whohas accessed patient data,audit logs have the potential for moreeffective security oversight than

7、traditional paper record envi-ronments.This specification will identify functionality neededfor audit log management,the data to be recorded,and the useof audit logs as security and management tools by organiza-tional managers.1.3 In the absence of computerized logs,audit log principlescan be implem

8、ented manually in the paper patient recordenvironment with respect to permanently monitoring paperpatient record access.Where the paper patient record and thecomputer-based patient record coexist in parallel,securityoversight and access management should address both envi-ronments.1.4 The second pur

9、pose of this specification is to identifyprinciples for establishing a permanent record of disclosure ofhealth information to external users and the data to be recordedin maintaining it.Security management of health informationrequires a comprehensive framework that incorporates man-dates and criter

10、ia for disclosing patient health informationfound in federal and state laws,rules and regulations andethical statements of professional conduct.Accountability forsuch a framework should be established through a set ofstandard principles that are applicable to all health care settingsand health infor

11、mation systems.1.5 Logs used to audit and oversee health informationaccess and disclosure are the responsibility of each health careorganization,data intermediary,data warehouse,clinical datarepository,third party payer,agency,organization or corpora-tion that maintains or provides,or has access to

12、individually-identifiable data.Such logs are specified in and support policyon information access monitoring and are tied to disciplinarysanctions that satisfy legal,regulatory,accreditation and insti-tutional mandates.1.6 Organizations need to prescribe access requirements foraggregate data and to

13、approve query tools that allow auditingcapability,or design data repositories that limit inclusion ofdata that provide potential keys to identifiable data.Inferencingpatient identifiable data through analysis of aggregate data thatcontains limited identifying data elements such as birth date,birth l

14、ocation,and family name,is possible using software thatmatches data elements across data bases.This allows aconsistent approach to linking records into longitudinal casesfor research purposes.Audit trails can be designed to workwith applications which use these techniques if the queryfunctions are p

15、art of a defined retrieval application but oftenstandard query tools are not easily audited.This specificationapplies to the disclosure or transfer of health information(records)individually or in batches.1This specification is under the jurisdiction of ASTM Committee E31 onHealthcare Informatics an

16、d is the direct responsibility of Subcommittee E31.25 onHealthcare Data Management,Security,Confidentiality,and Privacy.Current edition approved March 1,2013.Published March 2013.Originallyapproved in 2001.Last previous edition approved in 2009 as E2147 01(2009).DOI:10.1520/E2147-01R13.2The boldface numbers in parentheses refer to the list of references at the end ofthis standard.Copyright ASTM International,100 Barr Harbor Drive,PO Box C700,West Conshohocken,PA 19428-2959.United States1 1.7 Thi

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 专业资料 > 国外标准

copyright@ 2008-2023 wnwk.com网站版权所有

经营许可证编号:浙ICP备2024059924号-2